Behavioral task
behavioral1
Sample
36db77128b1c2a121c4349b73c859022_JaffaCakes118.doc
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
36db77128b1c2a121c4349b73c859022_JaffaCakes118.doc
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
36db77128b1c2a121c4349b73c859022_JaffaCakes118
-
Size
11KB
-
MD5
36db77128b1c2a121c4349b73c859022
-
SHA1
d43d38e273891d7d60081c0f380af5793830dd08
-
SHA256
94415a95793326d183771cf2cd6df70b712337c2c090ad8a0bfb481a1abbdf81
-
SHA512
7fb41472fb7e9ff6326ca90d043615e1ff4a2c3cffa9b28b87d9bcd0a87d0ca640ba1ba0962e20f504ba3f2e2403f8682c882dbdd410fe586d17445da459dc21
-
SSDEEP
192:0rME0jqCV8v/t+CqQaz/KYbrYH642/R3a8QZW:0wE0j9V8v/tL2eE/3
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
36db77128b1c2a121c4349b73c859022_JaffaCakes118.doc windows office2003
ThisDocument